You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/create-nrt-rules.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,9 +3,8 @@ title: Work with near-real-time (NRT) detection analytics rules in Microsoft Sen
3
3
description: This article explains how to view and create near-real-time (NRT) detection analytics rules in Microsoft Sentinel.
4
4
author: yelevin
5
5
ms.topic: how-to
6
-
ms.date: 11/09/2021
6
+
ms.date: 11/02/2022
7
7
ms.author: yelevin
8
-
ms.custom: ignite-fall-2021
9
8
---
10
9
# Work with near-real-time (NRT) detection analytics rules in Microsoft Sentinel
11
10
@@ -35,15 +34,15 @@ You create NRT rules the same way you create regular [scheduled-query analytics
35
34
36
35
1. From the Microsoft Sentinel navigation menu, select **Analytics**.
37
36
38
-
1. Select **Create** from the button bar, then **NRT query rule** from the drop-down list.
37
+
1. Select **Create** from the button bar, then **NRT query rule (preview)** from the drop-down list.
39
38
40
-
:::image type="content" source="media/create-nrt-rules/create-nrt-rule.png" alt-text="Create a new NRT rule.":::
39
+
:::image type="content" source="media/create-nrt-rules/create-nrt-rule.png" alt-text="Screenshot shows how to create a new NRT rule." lightbox="media/create-nrt-rules/create-nrt-rule.png":::
41
40
42
41
1. Follow the instructions of the [**analytics rule wizard**](detect-threats-custom.md).
43
42
44
43
The configuration of NRT rules is in most ways the same as that of scheduled analytics rules.
45
44
46
-
- You can refer to [**watchlists**](watchlists.md)and [**threat intelligence feeds**](understand-threat-intelligence.md)in your query logic.
45
+
- You can refer to [**watchlists**](watchlists.md) in your query logic.
47
46
48
47
- You can use all of the alert enrichment methods: [**entity mapping**](map-data-fields-to-entities.md), [**custom details**](surface-custom-details-in-alerts.md), and [**alert details**](customize-alert-details.md).
49
48
@@ -69,5 +68,5 @@ You create NRT rules the same way you create regular [scheduled-query analytics
69
68
70
69
In this document, you learned how to create near-real-time (NRT) analytics rules in Microsoft Sentinel.
71
70
72
-
- Learn more about about [near-real-time (NRT) analytics rules in Microsoft Sentinel](near-real-time-rules.md).
71
+
- Learn more about [near-real-time (NRT) analytics rules in Microsoft Sentinel](near-real-time-rules.md).
73
72
- Explore other [analytics rule types](detect-threats-built-in.md).
Copy file name to clipboardExpand all lines: articles/sentinel/near-real-time-rules.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,9 +3,8 @@ title: Detect threats quickly with near-real-time (NRT) analytics rules in Micro
3
3
description: This article explains how the new near-real-time (NRT) analytics rules can help you detect threats quickly in Microsoft Sentinel.
4
4
author: yelevin
5
5
ms.topic: conceptual
6
-
ms.date: 11/09/2021
6
+
ms.date: 11/02/2022
7
7
ms.author: yelevin
8
-
ms.custom: ignite-fall-2021
9
8
---
10
9
# Detect threats quickly with near-real-time (NRT) analytics rules in Microsoft Sentinel
11
10
@@ -40,7 +39,7 @@ The following limitations currently govern the use of NRT rules:
40
39
41
40
1. As this type of rule is new, its syntax is currently limited but will gradually evolve. Therefore, at this time the following restrictions are in effect:
42
41
43
-
1. The query defined in an NRT rule can reference **only one table**. Queries can, however, refer to multiple watchlists and to threat intelligence feeds.
42
+
1. The query defined in an NRT rule can reference **only one table**. Queries can, however, refer to multiple watchlists.
0 commit comments